Course Highlights
- Phishing schemes. Macro viruses. Spyware. These are some of the greatest threats of the digital age—and the world needs cybersecurity experts like never before. This course will provide you with the foundations on how to contribute to managing information security, plan for your security incident response
- The course focusses on the following objectives:
- Understand the current nature of the security threat landscape and study the new security architecture and features of Microsoft’s Azure.
- Insights into Azure Security services to help secure your services and data within Azure
- Knowledge of Azure security best practices
- Understanding of the terminology, tools, and techniques for creating a secure resilient cloud services
- Co-branded certificate by FutureSkills Prime & SkillUp
- Eligible for GOVT. OF INDIA Incentives
- Job Roles:
- Security Analyst
-
Skill Type
-
Course Duration
-
Domain
-
GOI Incentive applicable
-
Course Category
-
Nasscom Assessment
-
Placement Assistance
-
Certificate Earned
-
Content Alignment Type
-
NOS Details
-
Mode of Delivery
Course Details
What will you learn in Managing Information Security (SKO 0901) course?
After completing this course students will have the ability to:
- Describe signature-based and behavioral / heuristic detection methods
- List the capabilities of on-premise threat detection and mitigation tools
- Name the capabilities of hybrid and cloud threat detection and mitigation tools
- Recognize the importance of Enterprise threat detection monitoring
Why you should take Managing Information Security (SKO 0901) course?
This course will provide you with the foundations on how to contribute to managing information security, plan your security incident response, detect threats and Learn how to take advantage of Microsoft's Azure. Security Services.
Who should take Managing Information Security (SKO 0901) course?
This course is designed for those who want to manage an enterprise security incident, while avoiding common errors, increasing both the effectiveness and efficiency of the incident response efforts.
Curriculum
- Module 1
- Introduction
- What is threat modelling?
- Key Takeaways from Cyberattacks
- Cyber Threat modelling
- NIST Cybersecurity Framework
- Prepare for a security incident
- Phases of a major response
- Recovery preparations
- Critical success factors
- Module 2
- Incident Response Policy, Plan, and Procedure Creation
- Creation of a CSIRT
- List for developing a CSIRT
- Team duties
- Team preparations
- Establishing team roles
- CSIRT communications
- Recovering your systems
- Key Takeaways
- Module 3
- The security incident report +H13
- Practice walking through a security incident report
- Next steps
!~mcd_text_data_6~!